//

Blog

Digital Forensics, Employee Misconduct | on August 12, 2020

How Legal Teams Can Leverage Digital Forensics to Triumph in Tough Business Litigation

How Legal Teams Can Leverage Digital Forensics to Triumph in Tough Business Litigation From accusations of discrimination against employees to a breach of contract between two business partners, every professional relationship has the potential to result in a lawsuit and litigation. As more interactions are taking place online, digital trails […]

read more

How Digital Forensics Can Identify Employee Non-Compete Violations

How Digital Forensics Can Help Identify and Enforce Employee Non-Compete Violations Introduction In a world of cut-throat competition across a global industry, an enterprise can be seriously compromised by a leak of their intellectual property or industrial secrets. The temptation for an individual employee to divulge information to a competitor […]

read more
Data Breach, Incident Response | on July 5, 2020

COVID-19 Cyber Threat Indicators

COVID-19 Cyber Threat Indicators COVID-19 has produced a worldwide physical virus scare that has everyone on edge. Unfortunately, Hackers have not wasted any time in capitalizing on taking advantage of those suffering from the deadly effects of COVID-19. To prevent further compromise, you must take precautions within your corporate networks […]

read more

Insiders Threats and Unexplained Inventory Loss: A Response Guide

Insiders Threats and Unexplained Inventory Loss: A Response Guide Employee relationships should be based on trust. Our staff, after all, are on the frontline of the business, creating products, selling them, interacting with customers, and more. However, trust can sometimes be broken. This was the case when a U.S. man […]

read more

How digital forensic investigations can help businesses respond to employee theft

How digital forensic investigations can help businesses respond to employee theft   It’s estimated that intellectual property (IP) accounts for more than 80% of the value of publicly traded companies. From trade secrets and confidential corporate strategies to sensitive technology diagrams and customer databases, this information is what keeps the […]

read more

A Quick Guide to Workplace Investigations

A Quick Guide to Workplace Investigations Cyber security breaches stemming from insider threats have increased consistently over the last few years. While companies seek to hire the best, brightest, and most ethical people to help make their business a success, things don’t always go as planned. Circumstances change, motivations transform, […]

read more
Blog, Data Breach, Incident Response | on March 31, 2020

Kwampirs Malware targeting Global Industries

Kwampirs Malware targeting Global Industries Including the Healthcare Sector, Supply Chain, Financial Institutions, and prominent Law firms. The Federal Bureau of Investigation (FBI) has sent a security alert to the U.S. private sector about an ongoing attack against the healthcare sector, supply chain software vendors, financial institutions and prominent law […]

read more

Addressing Employee Data Theft in your Organization

Addressing Employee Data Theft in your Organization Almost a decade ago, Jason Needham left his job at an engineering firm to start his own company. After resigning, through virtual backdoors and unauthorized accounts, Jason was able to continue accessing his former employee’s data and systems. Over two years after leaving […]

read more
Blog, Data Breach, Incident Response | on March 3, 2020

When a file acts as a double agent and how to address it

When a file acts as a double agent and how to address it Incident response is a critical security and business function required to keep the integrity of any company in check. How a company reacts when the pressure is on could potentially make or break the financial fallout of […]

read more
Blog, Digital Forensics | on January 30, 2020

Future of Automation in Digital Forensics

Techno Security & Digital Forensics Conference 2018 program featured 67 sessions led by 64 industry experts organized under the primary tracks of Audit/Risk Management, Forensics, Investigations, Information Security, and Sponsor Demos. Session topics included Password Cracking, Digital Evidence from Social Networking, Apple File Systems, Dark Web Investigations, Windows PowerShell, Drone […]

read more